Skip to main navigation Skip to search Skip to main content

Secure two-party computation via cut-and-choose oblivious transfer

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

119 Scopus citations

Fingerprint

Dive into the research topics of 'Secure two-party computation via cut-and-choose oblivious transfer'. Together they form a unique fingerprint.
Sort by

Keyphrases

Computer Science